Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?

Comment Re:Linux is getting much, much worse, too. (Score 1) 458

annoying and childish.

Quite right. Even though I believe systemd is very poorly designed and is badly damaging the Linux ecosystem, there is also the concept of picking your battles. Badly off-topic rants are counterproductive.

"I don't know how systemd works ..."

This kind of willfully-blind pro-systemd talking point is also inappropriate. This often-repeated claim is uninformed projection. If you want to join the argument, please actually listen to what the complaints about systemd actually are (it isn't an unwillingness to learn new tools)... in another thread!

Comment Re:End game? (Score 5, Interesting) 152

What's the end game with all this?

China is showing us one of the possible end games. Facebook is already patenting features along those lines. Combined with omnipresent spying, this "new" type of oppression will work. It's a terrifying future.

It's like a new cold war.

Dan Geer describes our situation as a cold civil war. It would be useful if more people recognized that.

Comment Re:Can a tech-savvy user make their smart TV secur (Score 1) 65

... practical choice ... or not get anything

Yes. That's the sacrifice I talked about. There was a time many years ago when these problems could be fought without needing a sacrifice. Now, fighting against these trends requires a sacrifice. You might not get to watch TV. That might even impact other areas of your life. It might even be a significant loss of wage or opportunity. Why would you think fighting against a well-funded opponent would be free or easy?

My point was that these costs are increasing. You can pay this cost now, which requires some sacrifice, or you can signal your acceptance of these policies making any future attempt to fight back even harder. Do you want to sacrifice "merely" some luxuries like TV? Or do you want to wait until it requires sacrificing a lot more? Going without TV is easy. Try fighting this when the only refrigerator you can buy is "smart".

Comment Re:Snitching devices (Score 3, Insightful) 423

Hyperbole? Only if "call the authorities" is the only thing that spyware like this does. Given the news of the last few years, you should know that there are a lot more risks from spyware than a simple broken crash sensor.

As for your insistence on seeing an "example, real world" - why is it that apologists like you always freak out any time someone suggest that at problem needs to be fixed before it injures someone? Are you only willing to care about something after someone has their life ruined? Are you so suspicious of others that you won't believe them when they point out problems?

Beliefs like this - a just-world hypothesis - is one of the key problem of the modern world. Stop giving the benefit of the doubt when it it isn't deserved.

Comment Re:Can a tech-savvy user make their smart TV secur (Score 1) 65

If I can make it secure, why should I waste money on a streaming device when the feature is built in to my TV?

If you buy a "spyware" TV, but disable any problematic feature, you are sending the message to the manufacturer that they can get away with more of this crap in the future. Only by hitting them where they notice - their profit - will they change their behavior.

The same goes for any other product. Technically capable people that disable malicious features but still buy the product are a big part of the problem. People look to the techies when they consider new technologies. When they see "spyware" TVs being used, they get the idea that it's safe to buy one for themselves, except they are not going to be able to disable the malicious features.

As long as you value TV more than your security, privacy, and future freedom, businesses will continue to make their product more malicious. Fighting back against power often requires sacrifice; I strongly suggest fighting this now while it only require sacrificing a new TV for a while. If you wait, this fight will only become harder.

Comment Re:I guess they realised... (Score 4, Informative) 152

Each script is a bunch of boilerplate that has to reimplement the same stuff.

So shared libraries don't exist? That hasn't been a problem in a long time on BSD or OpenRC systems. Seriously, it's not hard to factor out code into a library. If you're only considering Debian, you have to remember that they are always behind (sometimes FAR behind) the update cycle.

The functionality is inconsistent between services.

Again, only if you were a moron and reinvented the wheel each script instead of using a common library.

That said, the ability to do things different is very important when you need to support something unusual.

To check whether a service is running, it uses pid files.

No, there is not requirement to use PID files. That is simply a common way to implement a daemon. With sysvinit and sysvrc (or OpenRc), this kind of thing is an implementation detail that is out of scope.

It doesn't have useful logging.

Again, this is by design, as it left logging *unspecified*. If you don't like syslog, nothing was preventing you from using something else. (also, "useful" is subjective)

because init doesn't log service crashes.

Patently incorrect, as I have used syslog to inspect startup crashes many times over the last *twenty years* I've been using UNIX. Maybe this has been a problem for other people, but I've never seen it. If your syslog is configured badly, that's an entirely separate problem.

Yay for "sleep" hacks.

While I can't speak for all distributions (you seem to have had some history with poorly-configured environments), there is nothing wrong with using sleep based polling. The only reliable way to detect if a prerequisite service is ready is by directly polling the service. (e..g issue an HTTP GET to a web server) The timeout is to allow startup to proceed in case of an error, (so you don't end up bricked, unable to use your computer)

on demand

There is a reason most distributions stopped using super-servers like xinetd: on-demand startup isn't that useful. Start your service at boot. You can defer expensive tasks until the first requests, if you want, which is when you would pay that cost anyway in an "on demand" launch. Listen to on the port, block on accept(2) or select(2) or similar, and let the OS page you out to the swap partition.

"On demand" isn't necessary, because the kernel already provides that feature. Adding a redundant implementation simply increases complexity and adds more opportunity for bugs. Super-servers make it even worse, as they add the risk that a problem in on service could take down all the services provided by the super-server.

Breaks horribly the moment something goes wrong.

Ok, now you're just trolling.

Want to have some fun? On a systemd box, pretend you just installed some updates, and you need to restart a few daemons so they run the updated versions. Try restarting dbus (system, not user). (You might want to make sure any open files are saved first)

Also, you might want to actually read about UNIX before you make these kinds of accusations. Reading taoup is a good place to start.

Comment Re:I guess they realised... (Score 3, Informative) 152

hey typically render pixmaps and just have the X server composite them

This is just nonsense. Your applications may be overly pixmap based (certain GTK+ engines started that mess when people prioritized "themes" over good design), but it is foolish to assume everybody else uses the same limited set of software. Remember, most of the software in the world is smaller private stuff used internally by businesses, academia, etc. Simply asserting that nobody uses various features doesn't make it true.

Wayland advocates really need to learn one of the most important lessons of software design, which was best explained by Joel Spolsky's essay "Things You Should Never Do, Part I".

[Y]ou can ask almost any programmer today about the code they are working on. "It's a big hairy mess," they will tell you. "I'd like nothing better than to throw it out and start over."

Why is it a mess?

"Well," they say, "look at this function. It is two pages long! None of this stuff belongs in there! I don't know what half of these API calls are for." [...]

The idea that new code is better than old is patently absurd. Old code has been used. It has been tested. Lots of bugs have been found, and they've been fixed. There's nothing wrong with it. It doesn't acquire bugs just by sitting around on your hard drive. [...]

Back to that two page function. Yes, I know, it's just a simple function to display a window, but it has grown little hairs and stuff on it and nobody knows why. Well, I'll tell you why: those are bug fixes. [...]

Each of these bugs took weeks of real-world usage before they were found. The programmer might have spent a couple of days reproducing the bug in the lab and fixing it. If it's like a lot of bugs, the fix might be one line of code, or it might even be a couple of characters, but a lot of work and time went into those two characters.

When you throw away code and start from scratch, you are throwing away all that knowledge. All those collected bug fixes. Years of programming work.

Yes, there are rough areas in X11 that really need to be fixed. That's true for almost any software project of sufficient size. Fortunately, the extension system in X11 allows a lot of those problems to be solved one at a time, while retaining backwards compatibility. The people that believe the very existence of backwards must somehow be a bottleneck are not creating the next version of X. Instead, they are creating something new. This is fine, but by their own definition, it is not a replacement for X11, and if Wayland tries to be such a replacement, it will inevitably grow to a similar level of "messiness" as numerous fixes, workarounds, and minor features are re-invented.

The problem with Wayland (and many other modern "replacement" projects, with systemd as the canonical example) is not technical in nature, but the hubris that so easily throws out so many man-years of effort.

Comment you are asking for more bad behavior in the future (Score 5, Insightful) 171

Scare quotes around spy? Your contempt towards people who think they should own their computer, not Microsoft, in duly noted.

You claim that since it's possible to disable Microsoft's spyware ("telemetry"), people should use Windows 10 instead of 8.1 (or, presumably, any other earlier version of Windows. For the moment, i will assume that you indeed have the ability to find 0all of the ways Microsoft is harvesting data (including supposedly "anonymized" statistics), and have some sort of method (or free time) to police all the forced updates in the future that may try to re-enable those features. I will also assume that Windows 10 is, as you say, "100% better", even though this is a situational claim that depends a lot on subjective opinion.

So Microsoft releases a version of windows that is actively hostile to it's users. You could choose the capitalist response and resisted upgrading punish them in the market until released a product people wanted ot buy. You could have chosen to avoid the problem by using a different vendor (or no vendor. You could have simply decided that your data is more important than shiny baubles and stayed with an earlier version of windows. You could have even taken a different approach an appealed to Microsoft (as a politician, as a journalist or even simply as a customer) to release a version of Windows 10 (perhaps at a higher price) that didn't have the features you don't want and will have to spend time removing. All of these options signal correctly to Microsoft that maybe they shouldn't be so brazen and presumptuous with user data in the future.

Instead, you choose to pay Microsoft (either directly with cash or indirectly with your data and privacy. By choosing to reward Microsoft for their decision to make Windows into spyware., you are conditioning them to continue adding spyware to their products. By choosing to shield Microsoft form the costs of cleaning up their own mess by paying your own time to "disable all the telemetry", you bias the feedback they receive even further towards "more spyware".

Of course, I'm being a bit presumptuous. You didn't actually claim to have disabled telemetry yourself, so the better interpretation of your comment is that you are an apparatchik - a true believer that truly believes the "features" provided in Windows 10 are worth more than the your future privacy.

Eventually, Microsoft will release yet another version of windows (they've always love their service packs) that you finally offends even the sensibilities of the apparatchick. Maybe you finally woke up to the full breadth of what they are collection. Maybe you finally got tired trying to find all the new laces they hide their "telemetry" spyware every time new patches show up on Windows Update. You will be very annoyed, but remember, you asked for that future by staying with Windows. You asked to be spied on when you continued to pay them. Well, I hope you enjoy the consequences. of those choices.

Comment Re:Speaking of MS and "privacy" (Score 1) 103

Even if we assume this is accurate and this "telemetry" data is the only spying they are doing (a patently incorrect assumption), this is still an incredible amount of metadata being collected.

A lot of people - even some that should know better - have bought the propaganda that spying on "metadata" doesn't matter. In reality, metadata (or "anonymous" usage statistics) is the most valuable data that can be collected in bulk. As former CIA and NSA director Michael Hayden said, "We kill people based on metadata..

This data is obviously profitable among the businesses using surveillance as a business model because you are the product, but that's not the biggest problem.

Knowing what programs you run - and when you run them - can be enough to start building a pattern of life profile. When do you wake up. When do you spend time near your home router's IP address running a web browser. When do you tend to run MS Office, with the telemetry coming from an IP owned by business instead of your usual home IP? I'm sure modern data analysis tools could find a lot more interesting stuff out of telemetry data.

Comment Re:Install Linux (Score 1) 288

That's what you get when you buy a product that depends on a single vendor for its mission-critical supply chain.

As you are a marine, you should be concerned about how much of your ability to function as an armed force depends strictly on a single vendor. Engineering fields and especially defence suppliers traditionally required a second source for any mission-critical parts.

Then again, what do I know. Given that the armed forces seem to be fine depending on China for most military hardware, what's another Sword of Damocles hanging our head?

Comment Re:The backdoors are already in place (Score 1) 142

if the owner of the PC chooses

No, the OEM will get to choose, just like they do today in other areas. I suppose the laptops with UEFI SecureBoot enabled don't exist in your world?

I work for Intel

So you're a collaborator. I hope you like the future you're creating. Maybe you should wake up to what is actually happening in the world?

Comment Re:The backdoors are already in place (Score 1) 142

Every time I see people discussing AMT, they leave out the final piece of the puzzle: Intel's SGX ("Software Guard Extensions") instructions that are in Skylake and future CPUs. SGX lets a program set up "secure enclaves" in RAM that are encrypted in the CPU and cannot be accessed by other programs, including the OS itself. As the data is encrypted outside of the CPU, you cannot even use a cold-boot attack or a logic analyser to access the data the hard way.

The only people talking about these instructions seem to be the occasional crypto researcher musing about how this could be a nice feature for protecting private keys. I'm sure that's possible, but Intel clearly has another goal in mind.

1. Allow application developers to protect sensitive data from unauthorized access or modification by rogue software running at higher privilege levels.


5. Enable the development of trusted applications [...]

6. Enable software vendors to deliver trusted applications and updates [...]


8. Enable applications to define secure regions of code and data that maintain confidentiality even when an attacker has physical control of the platform and can conduct direct attacks on memory.

In case anybody has forgotten, "trusted applications" is a dog whistle for DRM, originally popularized by Microsoft when they announced "Palladium". Good luck investigating what AMT is doing when the RAM it uses is encrypted.

Of course, some people in this very thread are already apologizing for Intel and claiming AMT isn't a threat. They probably said the same thing about Windows 10, too, with claims that the spyware wasn't important because it could (with much hassle) be disabled. Well, good luck in future Windows versions when the spyware is an encrypted SGX enclave.

Slashdot Top Deals

The primary function of the design engineer is to make things difficult for the fabricator and impossible for the serviceman.